2. IWIA 2004:
Charlotte,
North Carolina,
USA
John L. Cole, Stephen D. Wolthusen (Eds.):
Proceedings of the Second IEEE International Workshop on Information Assurance (IWIA'04), April 8-9, 2004, Charlotte, North Carolina, USA.
IEEE Computer Society 2004, ISBN 0-7695-2117-7 BibTeX
@proceedings{DBLP:conf/iwia/2004,
editor = {John L. Cole and
Stephen D. Wolthusen},
title = {Proceedings of the Second IEEE International Workshop on Information
Assurance (IWIA'04), April 8-9, 2004, Charlotte, North Carolina,
USA},
booktitle = {IWIA},
publisher = {IEEE Computer Society},
year = {2004},
isbn = {0-7695-2117-7},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
Network Security Metrics and Tools
- Yen-Hung Hu, Hongsik Choi, Hyeong-Ah Choi:
Packet Filtering for Congestion Control under DoS Attacks.
3-18
Electronic Edition (link) BibTeX
- Gustave Anderson, Leonardo Urbano, Gaurav Naik, David Dorsey, Andrew Mroczkowski, Donovan Artz, Nicholas Morizio, Andrew Burnheimer, Kris Malfettone, Daniel Lapadat, Evan Sultanik, Saturnino Garcia, Maxim Peysakhov, William C. Regli, Moshe Kam:
A Secure Wireless Agent-based Testbed.
19-32
Electronic Edition (link) BibTeX
- Giuseppe Ateniese, Chris Riley, Christian Scheideler:
Survivable Monitoring in Dynamic Networks.
33-47
Electronic Edition (link) BibTeX
- Jerald Dawkins, John Hale:
A Systematic Approach to Multi-Stage Network Attack Analysis.
48-58
Electronic Edition (link) BibTeX
Intrusion Detection
Host Security
Modeling and Evaluation
Copyright © Sat May 16 23:27:16 2009
by Michael Ley (ley@uni-trier.de)